Data Indexing Methods
Chainsight supports three main ways to bring data into the network, each balancing cost, security, and speed.
A. Cost-Friendly Backend Ingestion
Summary: A simpler approach where Chainsight’s internal nodes fetch data from an API and push it into the indexer. Minimal overhead.
Pros: Cheaper, faster to set up. Great for frequent updates on less critical data.
Cons: Doesn’t provide advanced cryptographic proofs of authenticity. Best used if cost is the primary concern and you trust the data source or the aggregator.
B. zkTLS-Based Ingestion
Summary: Collaborate with an external cryptographic provider that fetches data, then proves it hasn’t been tampered with by generating a zero-knowledge proof.
Pros: Offers high integrity. Even though the node runs off-chain, the proof ensures data authenticity.
Cons: Range of supported data might be smaller; also typically higher overhead. Perfect for real-time pricing with strong security requirements.
C. Distributed HTTPS Outcalls (Consensus)
Summary: A set of distributed nodes each call the same HTTPS endpoint, then reach consensus on the result. If a majority or threshold agrees, the final data is stored.
Pros: No single aggregator. Good for widely used sources like public APIs.
Cons: Must wait a few seconds for consensus, so slower than direct push.
Last updated